Sciweavers

500 search results - page 76 / 100
» On Security in TCP IP over Wireless Network
Sort
View
WWW
2009
ACM
15 years 4 months ago
A P2P based distributed services network for next generation mobile internet communications
In this poster, we present a novel P2P (Peer to Peer) based distributed services network (DSN), which is a next generation operable and manageable distributed core network archite...
Yang Li, Yi-Chuan Wu, Jian-Ying Zhang, Jin Peng, H...
83
Voted
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 3 months ago
Extension and Application of the Network Utilization Characteristic Metric to IEEE 802.11e
— In this paper we describe a time-based admission control scheme for Multimedia over IP services in wireless LANs based on the IEEE 802.11e standard. We build on an existing wor...
Rosario Giuseppe Garroppo, Luca Tavanti, Stefano L...
81
Voted
MSWIM
2005
ACM
15 years 3 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
ACSAC
2005
IEEE
15 years 3 months ago
TARP: Ticket-based Address Resolution Protocol
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper operation. Unfortunately, vulnerabilities in the ARP protocol enable a raft of IP-based imperson...
Wesam Lootah, William Enck, Patrick McDaniel
IJNSEC
2010
143views more  IJNSEC 2010»
14 years 4 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar